Engineering Sciences/NOLTA-Social Implications of Technology and Information Ethics(Date:2011/07/05)

Presentation
Strongly Asymmetric PKD Cryptographic Algorithms : an implementation using the matrix model

Luigi ACCARDI,  Satoshi IRIYAMA,  Massimo REGOLI,  Masanori OHYA,  

[Date]2011/7/5
[Paper #]ISEC2011-21,SITE2011-18,ICSS2011-26,EMM2011-20
On Usage of Practical Web Application Source Code for Learning Support on Secure Coding

Ryosuke MIYAJI,  Seikoh NISHITA,  

[Date]2011/7/5
[Paper #]ISEC2011-22,SITE2011-19,ICSS2011-27,EMM2011-21
Public Key Cryptosystems Constructed Based on Cyclic Codes, Realizing Coding Rate of Exactly 1.0, K(XI)SE(g)PKC and K(XII)SE(g)PKC

Masao KASAHARA,  

[Date]2011/7/5
[Paper #]ISEC2011-23,SITE2011-20,ICSS2011-28,EMM2011-22
Construction of New Classes of Product-Sum Type Public Key Cryptosystem, K(IV)ΣPKC and K(I)ΣΠPKC

Masao KASAHARA,  

[Date]2011/7/5
[Paper #]ISEC2011-24,SITE2011-21,ICSS2011-29,EMM2011-23
Memory Saving Implementation of Cyclic Vector Multiplication Algorithm

Ryosuke TAKAHASHI,  Kenta NEKADO,  Yusuke TAKAI,  Yasuyuki NOGAMI,  Hiroto KAGOTANI,  Takashi NARITA,  

[Date]2011/7/5
[Paper #]ISEC2011-25,SITE2011-22,ICSS2011-30,EMM2011-24
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library(Part II)

Yumi SAKEMI,  Tetsuya IZU,  Masahiko TAKENAKA,  Masaya YASUDA,  

[Date]2011/7/5
[Paper #]ISEC2011-26,SITE2011-23,ICSS2011-31,EMM2011-25
Privacy-Preserving Protocol for Epidemiology in Effect of Radiation

TOMOKI SATO,  HIROAKI KIKUCHI,  JUN SAKUMA,  

[Date]2011/7/5
[Paper #]
A Proposal on Architecture of "Anonymization Cloud" as Data Anonymization Platform for Promotion of Cloud Computing Services using Personal Activity Information

Yasuhiko Nagai,  Ryoki Igarashi,  Hiroyuki Serikawa,  Ken Matsuoka,  Mario Fujita,  Shotaro Sato,  Tadashi Mima,  

[Date]2011/7/5
[Paper #]
A Proposal on Framework of Anonymity Evaluation Methodology based on the ISO/IEC15408 for Anonymization Processing Modules

Takeshi Matsuoka,  Ryoki Igarashi,  Hiroyuki Serikawa,  Yasuhiro Miyazawa,  Tadashi Mima,  Yasuhiko Nagai,  

[Date]2011/7/5
[Paper #]
Implementation and Evaluation of Virtual Machine Based Kernel Log Collector

MASAYA SATO,  TOSHIHIRO YAMAUCHI,  

[Date]2011/7/5
[Paper #]
Pseudo SSO for Web Application supported by Reverse Proxy Auto Login System

Takuya Morioka,  Katsumi Onishi,  Hideo Nakano,  

[Date]2011/7/5
[Paper #]
A Study on Authentication Using Acceleration and Button Operation

Daisuke Someya,  Madoka Hasegawa,  Yuichi Tanaka,  Shigeo Kato,  

[Date]2011/7/5
[Paper #]
A Study on Improvement of Hybrid Image Authentication by Considering Image Structure

Takao Miyachi,  Madoka Hasegawa,  Yuichi Tanaka,  Shigeo Kato,  

[Date]2011/7/5
[Paper #]
Proposal of Malicious Websites Detection System by Transition of Communications based on Unauthorized Redirection

Shingo Ando,  Masato Terada,  Hiroaki Kikuchi,  Jinhui Chao,  

[Date]2011/7/5
[Paper #]
The concept and implementation of MyJVN Version Checker

Masato Terada,  Yoshiaki Saito,  Masashi Ohmori,  Motokuni Souma,  Hideaki Kobayashi,  

[Date]2011/7/5
[Paper #]
ACM ASIACCS2011 Conference Report

SEIICHIRO MIZOGUCHI,  SATOSHI TANAKA,  KAZUHIRO MINAMI,  KUNIYASU SUZAKI,  KOUICHI SAKURAI,  

[Date]2011/7/5
[Paper #]
Prevention using API hook against DEP Bypass

Hironori Kurihara,  Takeshi Okamoto,  

[Date]2011/7/5
[Paper #]
Program Transformer for Injecting Numerous Harmless Bugs

YOSHIHIRO OYAMA,  TOMOKI KAI,  

[Date]2011/7/5
[Paper #]
複写される方へ

,  

[Date]2011/7/5
[Paper #]
Notice for Photocopying

,  

[Date]2011/7/5
[Paper #]
<<123>> 21-40hit(42hit)